A programmer is constructing an algorithm that predicts personality traits based on users' selection of their
favorite ice cream flavors. Which of the following programming concepts should be used to represent the flavor
of ice cream?
A user received an account compromise notice from an online retailer. Two weeks later, the user received
another notice stating the new compromise used the credentials from the first compromise. Which of the
following password best practices MOST likely would have prevented the second compromise?
A. Password age B. Password complexity C. Password reuse D. Password length
Joe, a tech-savvy teenager, has received one of the best new home Wi-Fi routers on the market. Joe's parents
have entrusted Joe to set up the router. To leverage the best throughput options available for Joe's devices, the
router is located in Joe's bedroom. Joe's parents' devices are set to slower standards. Which of the following is
being used for Joe's devices?
A. 802.11n 2.4GHz B. 802.11ac 2.4GHz C. 802.11n 5GHz D. 802.11ac 5GHz